From ${URL} : Quick Emulator(Qemu) built with the keyboard input event handlers support is vulnerable to a host memory leakage issue. It could occur if a guest user was to generate large keyboard events, faster than Qemu could process them. A privileged user inside guest could use this flaw to exhaust host memory, resulting in DoS. Upstream patch: --------------- -> https://lists.gnu.org/archive/html/qemu-devel/2017-04/msg05599.html @maintainer(s): after the bump, in case we need to stabilize the package, please let us know if it is ready for the stabilization or not.
commit ea97b0c7b7466e74a67ad714b07509c752f5870c Author: Matthias Maier <tamiko@gentoo.org> Date: Sat Apr 29 16:01:30 2017 -0500 app-emulation/qemu: Various security patches for 2.9.0 bug 616636, CVE-2017-8112 bug 616870 [1] bug 616872 [2] bug 616874 [1] [1] minor change, queued upstream, no CVE assigned yet [2] queued upstream, no CVE assigned yet Package-Manager: Portage-2.3.3, Repoman-2.3.2
*** Bug 617514 has been marked as a duplicate of this bug. ***
Added to an existing GLSA Request.
This issue was resolved and addressed in GLSA 201706-03 at https://security.gentoo.org/glsa/201706-03 by GLSA coordinator Yury German (BlueKnight).